discretionary security 中文意思是什麼

discretionary security 解釋
無條件安全
  • discretionary : 可自行選用的
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  2. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  3. Recommendation 6 of the consultation paper asks that the use of conditional fees be disclosed to the other party and that the court should have discretionary power to require security for costs in appropriate cases

    諮詢文件的第6項建議要求,如使用按條件收費安排,須向他方披露,而法庭具有酌情決定權,可對適當案件要求提供訟費保證。
  4. After the analysis of the typical instance of the security attack on the unix operating system, it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix

    本文通過重點分析針對unix操作系統的一些攻擊實例,指出現有的unix操作系統自主訪問機制和超級用戶特權實現方式是最主要的安全問題。
  5. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ), mandatory access control ( mac ) and least privilege management. finest granularity dac allows that the owner of an object can choose to grant access permission to any other user

    本論文主要在文件訪問控制和特權管理這兩方面對linux的安全性進行增強,即實現了細粒度的自主訪問控制、強制訪問控制、以及最小特權管理。
  6. In the beginning of the thesis, we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control. then we indicate the deficiency of the comparison of the security label in the practical application, and give the improved rules of security label comparison

    本文首先介紹了開發b1級安全數據庫的安全模型及其關鍵技術,著重描述了自主和強制訪問控制的模型,然後指出blp模型安全級的比較在實際應用中的不足,給出改進的安全級比較規則。
  7. Second, in according to the application security needs, the set of discretionary access permissions has been extended to twelve permissions, such as create / delete / getattr / setattr. these additional permissions have been added and implementation defined for different objects

    二、針對不同類型的客體,根據實際需要,將訪問控制權限由原來的讀、寫、執行細化到創建、刪除、讀取屬性和修改屬性等12種。
分享友人